The Digitalised Terrorism Ecology: A Systems Perspective
DOI:
https://doi.org/10.23962/10539/29196Abstract
This study uses a systematic review methodology to interpret existing literature on the digital dimensions of contemporary terrorism and counter-terrorism. Using the theory of synergetics as a guiding analytical framework, the study conducts meta-synthesis of relevant literature, including application of soft systems methodology (SSM), in order to generate conceptualisation of a digitalised terrorism ecology. This ecology comprises five interacting sub-systems: open digital infrastructure; digital information ecology; digital terrorism enactment; digital capabilities; and digital enslavement.
References
Alhojailan, M. I. (2012). Thematic analysis: A critical review of its process and evaluation.West East Journal of Social Sciences, 1(1), 39–47.
Ammar, J. (2019). Cyber gremlin: Social networking, machine learning and the global war on Al-Qaida- and IS-inspired terrorism. International Journal of Law and Information Technology, 27(3), 238–265. https://doi.org/10.1093/ijlit/eaz006
Asongu, S. A., Nnanna, J., Biekpe, N., & Acha-Anyi, P. N. (2019). Contemporary drivers of global tourism: Evidence from terrorism and peace factors. Journal of Travel C Tourism Marketing, 36(3), 345–357. https://doi.org/10.1080/10548408.2018.1541778
Autio, E., Nambisan, S., Thomas, L. D. W., & Wright, M. (2018). Digital affordances, spatial affordances, and the genesis of entrepreneurial ecosystems. Strategic Entrepreneurship Journal, 12(1), 72–95. https://doi.org/10.1002/sej.1266
Bartolucci, V. (2019). The discourse on terrorism of Donald Trump. In J. Kowalski (Ed.), Reading Donald Trump: A parallax view of the campaign and early presidency (pp. 127– 147). Cham, Switzerland: Springer. https://doi.org/10.1007/978-3-319-93179-1_7
Benson, D. C. (2014). Why the internet is not increasing terrorism. Security Studies, 23(2) 293–328. https://doi.org/10.1080/09636412.2014.905353
Bergvall-Kåreborn, B., Mirijamdotter, A., & Basden, A. (2004). Basic principles of SSM modeling: An examination of CATWOE from a soft perspective. Systemic Practice and Action Research, 17(2), 55–73. https://doi.org/10.1023/b:spaa.0000018903.18767.18
Bertram, L. (2016). Terrorism, the internet and the social media advantage: Exploring how terrorist organizations exploit aspects of the internet, social media and how these same platforms could be used to counter violent extremism. Journal for Deradicalization, 7, 225–252.
Blaker, L. (2015). The Islamic State’s use of online social media. Military Cyber Affairs, 1(1), 4. https://doi.org/10.5038/2378-0789.1.1.1004
Braun, V., Clarke, V., & Terry, G. (2014). Thematic analysis. In P. Rohleder & A. C. Lyons (Eds.), Qualitative research in clinical and health psychology (pp. 95–114). Basingstoke, UK: Palgrave Macmillan.
Burtch, G., Carnahan, S., & Greenwood, B. N. (2018). Can you gig it? An empirical examination of the gig economy and entrepreneurial activity. Management Science, 64(12), 5497–5520. https://doi.org/10.1287/mnsc.2017.2916
Campana, A., & Légaré, K. (2010). Russia’s counterterrorism operation in Chechnya: Institutional competition and issue frames. Studies in Conflict C Terrorism, 34(1), 47–63. https://doi.org/10.1080/1057610x.2011.531458
Carty, V., & Barron, F. G. R. (2019). Social movements and new technology: The dynamics of cyber activism in the digital age. In B. Berberglu (Ed.), The Palgrave handbook of social movements, revolution, and social transformation (pp. 373–397). Cham, Switzerland: Springer. https://doi.org/10.1007/978-3-319-92354-3_16
Carugati, A., Fernández, W., Mola, L., & Rossignoli, C. (2018). My choice, your problem ? Mandating IT use in large organisational networks. Information Systems Journal, 28(1), 6–47. https://doi.org/10.1111/isj.12120
Castells, M. (2011). The rise of the network society: The information age: Economy, society, and culture, volume 1 (2nd ed.). Hoboken, NJ: John Wiley & Sons.
Cecez-Kecmanovic, D., Galliers, R. D., Henfridsson, O., Newell, S., & Vidgen, R. (2014). The sociomateriality of information systems: Current status, future directions. MIS Quarterly, 38(3), 809–830. https://doi.org/10.25300/misq/2014/38:3.3
Checkland, P., & Scholes, J. (1990). Soft systems methodology in action. Hoboken, NJ: John Wiley & Sons.
Checkland, P. (1981). Systems thinking, systems practice. Hoboken, NJ: John Wiley & Sons. Daniel, E., Hartnett, E., & Meadows, M. (2017). Don’t throw rocks from the side-lines:
A sociomaterial exploration of organizational blogs as boundary objects. Information Technology C People, 30(3), 542–561. https://doi.org/10.1108/itp-02-2015-0036
Denning, D. E. (2010). Terror’s web: How the internet is transforming terrorism. In Y. Jewkes, & M. Yar, (Eds.), Handbook of internet crime (pp. 194–213). Milton, UK: Willan Publishing.
Doolin, B., & McLeod, L. (2012). Sociomateriality and boundary objects in information systems development. European Journal of Information Systems, 21(5), 570–586. https://doi.org/10.1057/ejis.2012.20
Doosje, B., Moghaddam, F. M., Kruglanski, A. W., De Wolf, A., Mann, L., & Feddes, A. R. (2016). Terrorism, radicalization and de-radicalization. Current Opinion in Psychology, 11, 79-84. https://doi.org/10.1016/j.copsyc.2016.06.008
Dunn, W. N. (2015). Public policy analysis: An integrated approach (6th ed.). Abingdon, UK: Routledge. https://doi.org/10.4324/9781315663012
Finin, T., Joshi, A., Kolari, P., Java, A., Kale, A., & Karandikar, A. (2008). The information ecology of social media and online communities. AI Magazine, 29(3), 77–92. https://doi.org/10.1609/aimag.v29i3.2158
García-Marco, F. J. (2011). Libraries in the digital ecology: Reflections and trends. Electronic Library, 29(1), 105–120. https://doi.org/10.1108/02640471111111460
Gillespie, M., Osseiran, S., & Cheesman, M. (2018). Syrian refugees and the digital passage to Europe: Smartphone infrastructures and affordances. Social Media + Society, January- March, 1–12. https://doi.org/10.1177/2056305118764440
Hafez, M., & Mullins, C. (2015). The radicalization puzzle: A theoretical synthesis of empirical approaches to homegrown extremism. Studies in Conflict C Terrorism, 38(11), 958–975. https://doi.org/10.1080/1057610x.2015.1051375
Hajj, N., McEwan, P. J., & Turkington, R. (2019). Women, information ecology, and political protest in the Middle East. Mediterranean Politics, 24(1), 62–83. https://doi.org/10.1080/13629395.2017.1380116
Haken, H. (1984). Can synergetics be of use to management theory? In H.-U. Gilbert, & J. B. Probst (Eds.), Self-organization and management of social systems: Insights, promises, doubts, and questions (pp. 33–41). Berlin: Springer. https://doi.org/10.1007/978-3-642-69762-3_3
Hawi, D., Osborne, D., Bulbulia, J., & Sibley, C. G. (2019). Terrorism anxiety and attitudes toward Muslims. New Zealand Journal of Psychology, 48(1), 80–89.
Huberman, B. A. (2003). The laws of the web: Patterns in the ecology of information. Cambridge, MA: MIT Press.
Kagwanja, P. (2006). Counter-terrorism in the Horn of Africa: New security frontiers, old strategies. African Security Studies, 15(3), 72–86. https://doi.org/10.1080/10246029.2006.9627608
McLuhan, M., with Gordon, W. T., Lamberti, E., & Scheffel-Dunand, D. (2011). The Gutenberg galaxy: The making of typographic man. Toronto: University of Toronto Press. Merali, Y. (2006). Complexity and information systems: The emergent domain. Journal of Information Technology, 21(4), 216–228. https://doi.org/10.1057/palgrave.jit.2000081
Newman, E. (2006). Exploring the root causes of terrorism. Studies in Conflict C Terrorism, 29(8), 749–772. https://doi.org/10.1080/10576100600704069
Ochara, N. M. (2014). Towards a regional ontology for e-participation: An ecological view. In P. M. Sebina, K. H. Moahi & K. J. Bwalya (Eds.), Digital access and e-government: Perspectives from developing and emerging countries (pp. 60–72). Hershey, PA: IGI Global. https://doi.org/10.4018/978-1-4666-5868-4.ch005
Ochara, N. M. (2013). Linking reasoning to theoretical argument in information systems research. AIS Electronic Library (AISeL), 1–11. Retrieved from http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1501&context=amcis2013
Odero, K., Ochara, N. M., & Quenum, J. (2017). Towards big data-driven logistics value chains for effective decision making and performance measurement. In Proceedings of the 11th European Conference on Information Systems Management (ECISM 2017), Genoa, Italy, 14-15 September. https://doi.org/10.2139/ssrn.2960510
Omand, D. (2018). The threats from modern digital subversion and sedition. Journal of Cyber Policy, 3(1), 5–23. https://doi.org/10.1080/23738871.2018.1448097
Paganini, P. (2016). The role of technology in modern terrorism. Madison, WI: InfoSec Institute.
Park, Y. A., & Gretzel, U. (2007). Success factors for destination marketing web sites: A qualitative meta-analysis. Journal of Travel Research, 46(1), 46–63. https://doi.org/10.1177%2F0047287507302381
Plantin, J.-C., Lagoze, C., Edwards, P. N., & Sandvig, C. (2018). Infrastructure studies meet platform studies in the age of Google and Facebook. New Media C Society, 20(1), 293–310. https://doi.org/10.1177/1461444816661553
Rittel, H. W., & Webber, M. M. (1973). 2.3 planning problems are wicked problems. In N. Cross (Ed.), Developments in design methodology. Chichester, UK: John Wiley & Sons.
Schmitt, M., Eid, M., & Maes, J. (2003). Synergistic person x situation interaction in distributive justice behavior. Personality and Social Psychology Bulletin, 29(1), 141–147. https://doi.org/10.1177/0146167202238379
Schuurman, B. (2019). Topics in terrorism research: Reviewing trends and gaps, 2007–2016. Critical Studies on Terrorism, 12(3), 463–480. https://doi.org/10.1080/17539153.2019.1579777
Sela-Shayovitz, R., & Dayan, H. (2019). Female Palestinian terrorists: The role of the Intifada period and the terrorism context. Studies in Conflict C Terrorism, 1–18. https://doi.org/10.1080/1057610x.2019.1575027
Sirgy, M. J., Estes, R. J., El-Aswad, E.-S., & Rahtz, D. R. (2019). Proposed response: Counterterrorism strategies focusing on the demand side of the terrorism market. In Combatting Jihadist terrorism through nation-building: A quality-of-life perspective (pp. 149–173). Cham, Switzerland: Springer. https://doi.org/10.1007/978-3-030-17868-0_8
Statista. (2019). Global digital population as of July 2019 [Web page]. Retrieved from https://www.statista.com/statistics/617136/digital-population-worldwide/
Swanson, E. B., & Ramiller, N. C. (1997). The organizing vision in information systems innovation. Organization Science, 8(5), 458–474. https://doi.org/10.1287/orsc.8.5.458
Teigland, R., Holmberg, H., & Felländer, A. (2019). The importance of trust in a digital Europe: Reflections on the sharing economy and blockchains. In A. B. Engelbrekt, N. Bremberg, A. Michalski, & L. Oxelheim (Eds.), Trust in the European Union in challenging times (pp. 181–209). Cham, Switzerland: Springer. https://doi.org/10.1007/978-3-319-73857-4_9
Tuten, T., & Mintu-Wimsatt, A. (2018). Advancing our understanding of the theory and practice of social media marketing: Introduction to the special issue. Journal of Marketing Theory and Practice, 26(1–2), 1–3. https://doi.org/10.1080/10696679.2018.1393277
Weißenfels, S., Ebner, K., Dittes, S., & Smolnik, S. (2016). Does the IS artifact matter in sociomateriality research? A literature review of empirical studies. In 2016 49th Hawaii International Conference on System Sciences (HICSS), Koloa, 5–8 January. https://doi.org/10.1109/hicss.2016.252
Downloads
Published
Issue
Section
License
Copyright (c) 2020 https://creativecommons.org/licenses/by/4.0

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
- Abstract 267
- pdf 123